recently published a second threat report to provide updates on the remote access toolkit, or RAT, called “Decoy Dog,” which the company discovered in April. To establish command and control, Decoy Dog uses the Domain Name System.
Source: SiliconANGLE